You are on page 1of 10

Do you need a Blockchain?

Karl Wüst Arthur Gervais


Department of Computer Science Department of Computing
ETH Zurich Imperial College London
karl.wuest@inf.ethz.ch a.gervais@imperial.ac.uk

Abstract—Blockchain is being praised as a technological in- organizations and argue if and which blockchain type make
novation which allows to revolutionize how society trades and sense for the specific applications.
interacts. This reputation is in particular attributable to its
The remainder of this article is organized as follows. In
properties of allowing mutually mistrusting entities to exchange
financial value and interact without relying on a trusted third Section II, we briefly describe the most important background
party. A blockchain moreover provides an integrity protected about blockchain. In Section III we provide a structured
data storage and allows to provide process transparency. methodology to identify if a blockchain makes sense, and if
In this paper we critically analyze whether a blockchain is yes, which type of blockchain would be appropriate. Based on
indeed the appropriate technical solution for a particular appli-
our methodology, we analyze proposed use cases in detail in
cation scenario. We differentiate between permissionless (e.g.,
Bitcoin/Ethereum) and permissioned (e.g. Hyperledger/Corda) Section IV. In Section V, we review related work in the area,
blockchains and contrast their properties to those of a centrally and we conclude the article in Section VI.
managed database. We provide a structured methodology to
determine the appropriate technical solution to solve a particular II. BACKGROUND ON B LOCKCHAIN
application problem. Given our methodology, we analyze in depth
three use cases — Supply Chain Management, Interbank and In the following section, we detail the required blockchain
International Payments, and Decentralized Autonomous Orga- background and the involved parties. The name blockchain
nizations and conclude the article with an outlook for further
opportunities. stems from its technical structure — a chain of blocks. Each
block is linked to the previous block with a cryptographic
I. I NTRODUCTION hash. A block is a datastructure which allows to store a
Bitcoin and its blockchain have allowed mutually mistrust- list of transactions. Transactions are created and exchanged
ing entities to perform financial payments without relying by peers of the blockchain network and modify the state of
on a central trusted third party while offering a transparent the blockchain. As such, transactions can exchange monetary
and integrity protected data storage [1]. Due to these proper- amounts, but are not restricted to financial transactions only
ties, blockchain as a technology has gained much attention and for example allow to execute arbitrary code within so-
beyond the purpose of financial transactions – distributed called smart contracts.
cloud storage, smart property, Internet of Things, supply chain Before diving into the specific differences of permissionless
management, healthcare, ownership and royalty distribution, and permissioned blockchains, we now describe the different
and decentralized autonomous organizations just to name a participants of these networks. As applicable to any database
few. system, we denote as writer any entity which writes state
Contrary to Bitcoin’s permissionless blockchain, where any to the database. In a blockchain this would correspond to
writer and reader can join at any time, so-called permissioned a participant that is involved in the consensus protocol and
blockchains have been proposed, where only an authorized helps growing the blockchain. As such, a writer is able to
set of entities is allowed to write and read the respective accumulate transactions within a block and append this block
blockchain. A permissioned blockchain, however, shares sim- to the blockchain. Related work might also denominate a
ilarities with a centralized database, and this naturally brings writer as a validator. We denote a reader as any entity which
up the question whether a blockchain is better suited than a is not extending the blockchain, but participating in either the
centralized database. transaction creation process, simply reading and analysing or
In this work, we analyze the properties of different auditing the blockchain. Note that we consider regulators and
blockchain types (i.e. permissioned and permissionless) and blockchain software maintainers to be outside of this scope.
contrast these properties to those of a centrally managed Permissionless Blockchains Bitcoin [1] and Ethereum [2]
database. We provide a methodology to identify whether a are instances of permissionless blockchains, which are
blockchain is useful depending on the problem requirements, open and decentralized. Any peer can join and leave the
and if so, what type of blockchain might be appropriate. network as reader and writer at any time. Interestingly,
Based on our methodology, we evaluate in detail three use there is no central entity which manages the membership,
cases, namely (i) supply chain management, (ii) interbank or which could ban illegitimate readers or writers. This
and international payments and (iii) decentralized autonomous openness implies that the written content is readable by
any peer. With the use of cryptographic primitives how- Trust Anchor defines who represents the highest authority of
ever, it is technically feasible to design a permissionless a given system that has the authority to grant and revoke
blockchain which hides privacy relevant information (e.g. read and write access to a system.
Zerocash[3]).
Permissioned Blockchains To only authorize a limited set of B. Tensions between Transparency and Privacy
readers and writers, so called-permissioned blockchains There exist an inherent tradeoff between transparency and
have been recently proposed. Here, a central entity de- privacy. A fully transparent system allows anyone to see any
cides and attributes the right to individual peers to par- piece of information, i.e. no privacy is provided. Likewise,
ticipate in the write or read operations of the blockchain. a fully private system provides no transparency. However, a
To provide encapsulation and privacy, reader and writer system can still provide significant privacy-guarantees while
could also run in separated parallel blockchains that making the process of state transitions transparent, e.g. a
are interconnected. The most widely known instance of distributed ledger can provide public verifiability of its overall
permissioned blockchains are Hyperledger Fabric and R3 state without leaking information about the state of each
Corda [4]. individual participant. Privacy in a public system can be
achieved using cryptographic techniques but typically comes at
the cost of lower efficiency. The cryptocurrency Zerocash [3]
A. Properties for example makes use of computationally expensive cryptog-
raphy to provide full anonymity while still providing sufficient
In the following, we describe and compare the most relevant
transparency to publicly verify the ledger state.
properties that distributed ledgers and centralized systems
provide. III. W HERE DOES A B LOCKCHAIN MAKE SENSE ?
Public Verifiability allows anyone to verify the correctness In general, using an open or permissioned blockchain only
of the state of the system. In a distributed ledger, each makes sense when multiple mutually mistrusting entities want
state transition is confirmed by verifiers (e.g. miners in to interact and change the state of a system, and are not willing
Bitcoin), which can be a restricted set of participants. Any to agree on an online trusted third party.
observer, however, can verify that the state of the ledger To ease the decision making process, we provide a flow
was changed according to the protocol and all observers chart in Figure 1. We consider one or multiple parties that
will eventually have the same view of the ledger, at least write the system state, i.e. a writer corresponds to an entity
up to a certain length. In a centralized system, different with write access in a typical database system or to consensus
observers may have entirely different views of the state. participant in a blockchain system.
As such, they might not be able to verify that all state If no data needs to be stored, no database is required at all,
transitions were executed correctly. Instead, observers i.e. a blockchain, as a form of database, is of no use. Similarly,
need to trust the central entity to provide them with the if only one writer exists, a blockchain does not provide
correct state. additional guarantees and a regular database is better suited,
Transparency of the data and the process of updating the because it provides better performance in terms of throughput
state is a requirement for public verifiability. The amount and latency. If a trusted third party (TTP) is available, there are
of information that is transparent to an observer, however, two options. First, if the TTP is always online, write operations
can differ, and not every participant needs to have access can be delegated to it and it can function as verifier for state
to every piece of information. transitions. Second, if the TTP is usually offline, it can function
Privacy is an important property of any system. There exists as a certificate authority in the setting of a permissioned
an inherent tension between privacy and transparency. blockchain, i.e. where all writers of the system are known.
Privacy is certainly easier to achieve in a centralized If the writers all mutually trust each other, i.e. they assume
system because transparency and public verifiability are that no participant is malicious, a database with shared write
not required for the functioning of the system. access is likely the best solution. If they do not trust each other,
Integrity of information ensures that information is protected using a permissioned blockchain makes sense. Depending on
from unauthorized modifications, i.e. that retrieved data whether public verifiability is required, anyone can be allowed
is correct. The integrity of information is closely linked to read the state (public permissioned blockchain) or the
to public verifiability. If a system provides public verifia- set of readers may also be restricted (private permissioned
bility, anyone can verify the integrity of the data; integrity blockchain). If the set of writers is not fixed and known to the
can otherwise only be ensured if the centralized system participants, as is the case for many cryptocurrencies such as
is not compromised. Bitcoin, a permissionless blockchain is a suitable solution.
Redundancy of data is important for many use cases. In In Table I we contrast some properties of permissionless
blockchain systems, redundancy is inherently provided and permissioned blockchains, and a central database. In a
through replication across the writers. In centralized centralized systems, the performance in terms of latency and
systems, redundancy is generally achieved through repli- throughput is generally much better than in blockchain sys-
cation on different physical servers and through backups. tems, as blockchains add additional complexity through their
yes Are there yes Can you use Are all
Do you need no no Permissionless
multiple an always writers
to store state? Blockchain
writers? online TTP? known?

no no yes yes

Are all Is public yes Public


no
writers verifiability Permissioned
trusted? required? Blockchain

yes no

Private
Permissioned
Blockchain

Don’t use
Blockchain

Fig. 1: A flow chart to determine whether a blockchain is the appropriate technical solution to solve a problem (Table I should
be considered in the decision making process as well). Writers refer to entities with write access to the database/blockchain,
i.e. in a blockchain setting, a writer corresponds to a consensus participant. If a trusted third party (TTP) is available that is
not always online, this can be used to establish a known group of writers, i.e. the TTP can function as a certificate authority
in such a setting. Public and private permissioned blockchains differ in that a public blockchain allows anyone to read the
contents of the chain and thus verify the validity of the stored data, while a private blockchain only allows a limited number of
participants to read the chain. Note that for any blockchain based solution it is possible to make use of cryptographic primitives
in order to hide privacy-relevant content.

consensus mechanism. For example, Bitcoin can currently only sense and what the technical, security and privacy implications
sustain a throughput of approximately seven transactions per would be.
second (which could be extended to approximately 66 without
compromising security [6]), while a centralized system such as A. Supply Chain Management
Visa can handle peaks of more than fifty thousand transactions.
There is a tradeoff between decentralization, i.e. how well a In Supply Chain Management (SCM), the flow of materials
system scales to a large number of writers without mutual and services required in manufacturing a given product is
trust, and throughput, i.e. how many state updates a system can managed, which includes various intermediate storage and
handle in a given amount of time. When making the decision production cycles until the delivery to the final point of
of whether to use a blockchain system or not, this tradeoff consumption. Typically, multiple companies interact and trade
should be taken into account as well. on a global scale within a given supply chain. Due to this com-
plexity, associated costs of managing the inventory, processes
IV. C ASE BY C ASE and failure detection are particularly expensive.
In the following Section, we outline several use cases where Several companies (e.g. Skuchain [7], Provenance [8], Wal-
industrial efforts are advertising to use blockchain technology, mart [9], Everledger [10]) advertise to provide blockchain
two of which – supply chain management and interbank based solutions to improve the efficiency of supply chain
payments – we will discuss in detail. Where possible, we management solutions. Some even claim that blockchain tech-
evaluate objectively how a blockchain solution might make nology paves the way to demand instead of supply chains,
Permissionless Blockchain Permissioned Blockchain Central Database

Throughput Low High Very High


Latency Slow Medium Fast
Number of readers High High High
Number of writers High Low High
Number of untrusted writers High Low 0
Consensus mechanism Mainly PoW, some PoS BFT protocols (e.g. PBFT [5]) None
Centrally managed No Yes Yes

TABLE I: We differentiate between permissionless, permissioned blockchains and a centralized database. Note that a
permissioned blockchain can be public, for example if public verifiability of the content is desired.

where businesses will benefit from a greater flexibility in Everledger [10] has digitally certified over 1 mio. diamonds
interacting with different markets and balancing the price risks. and records every diamond permanently in the Everledger
Traditional SCM is driven by planning and communication. blockchain to provide a clear audit trail for stakeholders. While
The future demand is estimated based on the past and current Everledger does not provide technical details on their solution,
demand, information is pushed to the involved stakeholders Everledger claims to use a hybrid model between a public and
that hope to get the relevant information on time to respond a private blockchain to benefit from the permissioned controls
to changes, delays or errors. Companies decide what product in private blockchains.
is released to the market at what time, and customers indirectly
drive the demand.
In demand chain management (DCM), the customer’s inter-
est is at the core of the chain — reduced costs, performant
customer service, and faster go-to-market from idea or min-
imum viable product (MVP), just to name a few examples.
DCM allows for this increased flexibility by requiring all
stakeholders to have a real-time visibility of what consumers (a) Traditional SCM. (b) Blockchain powered SCM.
want and purchase. All parties of the demand chain have
therefore to be tightly connected within a network. Contrary Fig. 2: Traditional SCM (left) compared to blockchain-based
to SCM, which “optimizes the flow” and might be based on Supply Chain Management (right). Traditional SCM is dis-
incomplete and inaccurate market assessements, DCM requires tributed, i.e. there is no central entity. A blockchain powered
companies to have a complete and accurate view of the market SCM maintains a distributed ledger where participant can
to proactively choose optimal production decisions. As such, update and read (pull) the current SCM state.
the information flow in DCM’s is pull based rather than push
1) Outlook: The participants of a SCM vary greatly across
based: the stake holders do not need to wait for a notification,
different supply chains and the same peers might take different
but can actively query the state of the chain management.
roles across different supply chains. The segmentation basis
While SCM solutions certainly can and should be improved, for different actors in the supply chain is typically defined by
it is unclear why blockchain in particular is a suitable technical their respective ownership stake of the product that is being
solution. Skuchain [7] for instance (cf. Figure 2) relies on produced. This implies that a single blockchain would be
IBM’s Hyperledger Fabric [11] as blockchain backend. Fab- required for every supply chain that a participant is involved
ric’s pluggable consensus options allow for a wide range of in — which clearly deteriorates the performance of the final
flexibility on how many nodes are actually taking part in the solution.
consensus process. Skuchain acknowledged (upon request in Following our methodology from Section III, a SCM cer-
private correspondance) that for most supply chain manage- tainly requires to store data. Multiple writers are involved, i.e.
ment features a single source of truth would be sufficient — as the different participants of the SCM that own a certain share
such a single trusted database at Skuchain should be sufficient of the final product. Skuchain acknowledged to only require a
to satisfy most business needs. single source of trust, which would however remove the decen-
Provenance [8] aims to provide another blockchain based tralized component of the blockchain, and thus be equivalent to
solution for more transparency in product supply chains. a trusted central server. Continuing our methodology, a SCM
Provenance does not provide any details on their technical could technically likely always use an online TTP. If that is
product but claims that data can be accessed and verified by not possible, at least all writers will be known, which leaves
all actors. Even if Provenance manages to hide the actor’s us to choose between a permissioned or no blockchain.
identity (as claimed in the whitepaper), such data would leak This reasoning leaves us with the question whether all
a considerable amount of business critical information from writers can be trusted. Supply chain management has the
the different actors — e.g., production volume and times. inherent problem of the interface between the digital and
^

® ^ ®
Blockchain Blockchain

(a) Intended Scenario: The supply truck is refrigerated. (b) Attack Scenario: The trusted sensor is in a cooled compart-
ment, while the rest of the truck is unrefrigerated.
Fig. 3: An example for an attack that can be conducted against a tamperproof temperature sensor that writes collected data to
the blockchain to ensure proper cooling of goods in a supply chain. The left subfigure shows the intended situation, where the
delivery truch containing the goods is refrigerated, the trusted sensor measures the temperature and publishes the data to the
blockchain correctly. The right subfigure shows the possible attack, where the supplier – e.g. to save costs – only cools down
a small fridge inside of the truck in which he puts the sensor, while the goods are in the non-refrigerated section of the truck.

the physical world. A human, or some machine under the B. Interbank and International Payments
control of a single writer, typically is required to register In this Section, we outline how interbank and international
that a certain good has arrived in a warehouse, and if for payments are currently performed in the banking system. In
example its quality is appropriate. If there is no trust in the addition, we describe solutions based on distributed ledger
operation of these employees, then the whole supply chain technology that aim to simplify and replace the current system.
is technically compromised as any data can be supplied by Based on this understanding we explain the benefits and
a malicious writer. If, on the other hand, all writers are drawbacks of using distributed ledger technology to simplify
trusted, a blockchain is not needed as a regular database with interbank payments.
shared write access can be used instead. Note that if through 1) The Legacy System: Traditionally, in the current banking
some technical means, the connection between the digital and system, a transaction transferring money from an account at
physical world could be realized in a secure manner, then the bank A to an account at bank B takes multiple steps. Contrary
previous reasoning might change. to cash transfers, debts in bank transfers are typically not
Multiple companies are currently researching possibilities immediately settled.
of getting reliable data from some trusted hardware into the If Alice wants to transfer $100 to Bob, Alice’s account is
blockchain in order to achieve such a connection between the debited with $100 and Bob’s account should be credited with
digital and physical world. As an example, some companies the same amount. If the accounts are at the same bank, the
plan on using trusted temperature sensors to record temper- bank can simply apply these changes to their books because
ature data during the delivery of food and medicine, so that the total debit and credit amount of the bank remains identical.
this data can be used in smart contracts on the blockchain. If Alice however, has her account at bank A and Bob at bank
However, even if the temperature sensors are assumed to be B, the total debit of bank A changes when debiting Alice’s
tamperproof, there are several issues with such a solution. account. Similarly, if Bank B credits Bob’s account without
First, a smart contract relying on temperature data must be debiting another account with the same value, the sum of all
sure that the key used to sign the data really belongs to the debits and all credits at Bank B would no longer be equal.
sensor that is currently used for the shipment. This can likely This can be solved, if each of the banks have an account with
be solved with a sensibly designed PKI and some checks that the other bank (commonly referred to as a Nostro account).
the client has to perform before storing money in the smart Then, bank A could debit Alice’s account and credit B’s
contract. Second, and most importantly, a client still needs to account while bank B would debit A’s account and credit
fully trust the supplier for reliable data, because such sensors Bob’s account while modifying the respective Nostro account.
could be easily tricked even if tamperproof hardware is used. A In practice this would lead to large debts between banks
simple attack – on a temperature sensor in a refrigerated truck which brings a large amount of risk. Banks therefore have
– is shown in Figure 3. A supplier that e.g. wants to save cost accounts at a central bank, which is mirrored in a local account
by not cooling their delivery trucks could instead simply move (mirror account) at the bank for bookkeeping, where they
the sensor into a cooled compartment or fridge while keeping credit and debit the central bank. I.e., bank A debits Alice’s
the temperature in the rest of the truck unregulated. Figure 3a account, informs the central bank of the payment and credits
shows the intended situation: The sensor correctly records the mirror of their account at the central bank, the central
the temperature in the truck containing the goods. Instead, a bank debits the account of bank A, credits bank B’s account
malicious supplier could, however, use an unrefrigerated truck and informs B of the payment, who then debits their central
instead and only cool down a small compartment containing bank mirror account and credits Bob’s account. The central
the sensor as shown in Figure 3b. banks are used as settlement authorities for the payments in
Bank C FED

Nostro Bank A Mirror FED Nostro Bank C Nostro Bank B


100 100 100 100

Mirror Bank C Pos. USD Bob (USD) Mirror FED


100 100 100 100

Alice (EUR) Pos. EUR


94.35 94.35 Bank B

Bank A
Fig. 4: The logical flow of money and accounting steps involved in a traditional international payment in which Alice from
Europe pays USD 100 to Bob in the USA. At Bank A, Alice implicitly buys USD with EUR, i.e. her account gets debited
while the banks Euro account is credited with the same amount (EUR 94.35). The banks USD account then gets debited with
the bought USD, which are credited to the mirror account of Bank C, who then debit Bank A’s Nostro account (i.e. the account
that Bank A holds at Bank C) and credit the mirror account of the US central bank (FED). The FED then debits Bank C’s
Nostro account and credits Bank B, who then debits the central banks mirror account and finally credit Bob’s account with the
intended amount. Note that in this simplified example, fees that would occur in practice at intermediate steps are not shown.

the currency for which they are responsible, since they are not have a correspondent bank, additional intermediate hops
trusted to fulfill their debts (by issuing money if necessary). may be required which adds complexity, more delays and as
Already, three banks are involved for a single payment and a consequence higher costs.
in practice, additional parties such as clearing houses take part, Overall, the main drawbacks of the correspondent banking
such that low value payments can be batched and the central system are the long transaction confirmation time, the cost
bank does not need to be involved in every interbank payment. caused by the multiple intermediate hops and the trust that is
For international (i.e., inter currency) payments, even more required between the banks in order for the system to work.
parties need to be involved, e.g., if Alice has a Euro account 2) Distributed Ledger Technology for Interbank Payments:
at bank A located in the EU and bank B is located in the Due to the high costs entailed by the correspondent banking
USA. For cross currency payments, there is no single central system, many put their hopes into distributed ledger tech-
bank that is able to settle the payments and bank A does not nology to simplify interbank payments. Some central banks
have an account with the US central bank. such as the Monetary Authority of Singapore (MAS) and the
Instead, bank A has a USD account at some commercial Bank of Canada are working on solutions to use distributed
bank C in the USA, which we assume to be distinct from ledger technology for interbank payments [12], [13] and the
B for this example. This bank C is called A’s correspondent Federal Reserve Board in the US is also researching this
bank. This requires a trust relationship between banks A and technology [14]. In the solution of the MAS, banks deposit
C. In our example, some amount of Euro is debited in Alice’s some amount of money with the MAS and in return receive
account with which USD is implicitly bought by Alice at bank the same amount on the distributed ledger. The ledger can then
A, i.e., A’s Euro position increases while the USD position be used to immediately transfer money between the banks.
decreases by $100. The $100 are credited to the mirror account While this does not allow cross currency transfers, it simplifies
for A’s account at Bank C. Bank C then debits A’s account interbank payments within a single currency and is a first step
at their bank and transfers the money to bank B using the US towards replacing the payment system.
central bank (FED) for the settlement. This money transfer is Similarly, companies such as SWIFT [15] and Visa [16]
depicted in Figure 4. started to develop proof of concepts for international payments
For money transfers in currencies for which a bank does using blockchain technology. While these proof of concepts
are not yet public and very little information about them is
available, other solutions using distributed ledgers that aim to
simplify cross-border payments are already more developed.
Ripple [17] aims to provide a global settlement network
A B L2
based on a distributed ledger. Ripple only partially replaces
the correspondent banking system. Banks can continue to C
use correspondent banks to process payments in cases where L1
liquidity in the required foreign currency is available at low
rates. Otherwise, banks can use third party liquidity providers L3
to provide the required liquidity. D
Similar to the traditional correspondent banking system, a
payment may require multiple hops if no trust relationship
exists between the two banks that are parties in the transaction.
Contrary to the traditional system, the payment is atomic, i.e., Fig. 5: Three individual ledgers L1 , L2 , and L3 that are
either all of the intermediate payments go through or none of connected through nodes B and C, i.e. node B participates
them. In the traditional system, if something goes wrong for an as writer in L1 and L2 and node C participates in both L2
intermediate payment, previous payments have to be reversed and L3 . If each of these ledgers is a blockchain for one
and sometimes manual intervention is required. Additionally, currency, a payment from A to D can be routed through B
Ripple provides its own currency, XRP, which can be used as and C as atomic transaction, where B and C provide currency
intermediate currency for transactions. exchange. This can be achieved for example through hashed
XRP is the only currency on the Ripple ledger for which timelock contracts [18].
transactions do not entail counterparty risk. Other currencies
are “issued” by gateways that need to be trusted to settle
the owed debts outside of the distributed ledger if a party mentioned in Section II-B, this tension between transparency
chooses to withdraw a deposit. This means, for example, that and privacy can be resolved at the cost of efficiency by
not all USD have the same issuer and they are not backed using cryptographic techniques to provide privacy while also
by the central bank, i.e., an on-chain US Dollar is not a real ensuring public verifiability.
US Dollar and, de facto, every issuer creates a new parallel While current systems (such as Ripple) are not yet able
currency. Because of this gateway system, Ripple does not to provide trustless intercurrency money transfers, the future
remove the trust relationships required in the correspondent development in this area looks promising. Many central banks
banking system but simply shifts them to other parties, the currently research the possibilities of using blockchain tech-
gateways. nology for interbank payments and with centrally issued on-
This limitation could be removed if such a system would use chain currency, the value is defined by the actual value of the
central banks to act as gateways, since the currencies issued on currency and thus interchangeable.
Ripple would then actually correspond to the real currencies. If countries collaborate in designing their blockchains for
This would remove all trust requirements for settlement other interbank payments, they can be designed in a way that allow
than the trust in the central banks, which is a necessity in any interaction between chains, e.g. to provide atomic cross cur-
case when transacting in the corresponding currency. rency payments as shown in Figure 5. This can be done using
3) Outlook: For financial applications, blockchain technol- techniques that are also used in off-chain payment networks
ogy seems well suited in general, since parties are generally such as hashed timelock contracts [18] or by instantiating the
risk averse and do not want to rely on strong trust assumptions. blockchains as satellite chains [19]. In such a system, banks
We can evaluate the usefulness of blockchain technology for that have accounts on multiple chains can be used to exchange
a given system with our methodology from Section III. If we currency and route payments atomically internationally while
consider a system for interbank payments, we have multiple removing the trust requirements of the correspondent banking
parties, the banks, that act as writers. If we only consider system.
single currency systems, we do have a trusted third party,
the central bank. The central bank may, however, not want
C. Smart Contracts
to act as a verifier for every transaction and may only act as a
certificate authority giving out licenses to banks to participate Smart Contracts [20] are digital contracts that are self
in the system. This means that all writers of the system are enforcing or make it prohibitively expensive to break contract.
known and we can use a permissioned blockchain. Whether Since a blockchain can be used as a distributed state machine
the chain should be publicly verifiable is a matter of opinion, without a trusted third party, the technology is well suited
i.e. the blockchain can either be public or private. to support smart contracts. While Bitcoin already supports
On one hand, banks likely want to keep their monetary a limited set of smart contracts, Ethereum [2] was the
flows private, on the other hand, having public verifiability first blockchain to support arbitrary code execution on the
may increase the trust of the public in the monetary system. As blockchain, allowing any kind of smart contract.
Since contract partners do not usually fully trust each place to allow fixing vulnerabilities, they can become the target
other, blockchain technology is suitable for this application of attacks leading to the loss of large sums of money.
if the parties do not want to rely on a trusted third party, This happened in 2016 with the famous “DAO hack” that
because it can simplify trustless protocols between multiple lead to the split of the Ethereum blockchain. Before this attack,
parties. Depending on the setting and the requirements, a most of the community wanted smart contracts to be pieces
permissionless blockchain or a permissioned blockchain can of code that exactly codified the meaning of the contract. If
be used. If details of the contract should remain hidden and the execution of the code resulted in a different outcome than
the contract is only concerned with a limited set of known originally intended by the contract parties, the rules encoded in
participants, a permissioned blockchain such as Hyperledger the smart contract should be binding. Even the creators of “the
Fabric [11] may be the best fit. Otherwise – since smart DAO” stated in the conditions of their ICO that whatever the
contracts can also be established between multiple anonymous code does was its intention. In the wake of the “DAO” hack,
parties – a permissionless blockchain such as Ethereum can this sentiment has become less absolute. Even though parts of
be used. the community refused to create a hard fork in Ethereum to
Smart contracts can become especially powerful if they can refund the losses, most of the Ethereum community has taken
be connected to other digital information and the physical a more practical stance to preserve the original intentions.
world in some way. While the connection to other digital
information is already possible [21], [22], further connecting E. Proof of Ownership for Intellectual Property
the digital to the physical world would open up even more Proof of Ownership for intellectual property is an often
possibilities for use cases such as supply chain management proposed and straightforward use case for blockchains. If the
(cf. Section IV-A), IoT (cf. Section IV-G) and more. creator of some digital object wants to prove ownership at a
Because practical smart contracts are relatively new tech- later time, he can use a public blockchain as a time stamping
nology, it is not yet clear to what extent these are legally service by committing to the digital object together with his
binding, or how they should be interpreted. In many cases, identity, e.g. with a hash, and publishing that commitment
the jurisdiction will not even be clear and to the best of our on the blockchain. This allows to later prove that the object
knowledge there has not yet been a case where a judge ruled on existed at that time and was associated with the respective
the interpretation of a smart contract. While the original idea identity. While this does not fully prove ownership, it does
of smart contracts was that “code is law”, and many in the provide evidence of ownership if no one else can show that the
community believed very strongly in this statement, opinions object was previously published. Instead of using a blockchain,
have shifted somewhat after the “DAO hack” that we discuss a trusted third party could provide a proof of ownership, e.g. a
below. patent office. A public blockchain, however, eases the process
of providing a proof in a decentralized way and without
D. Decentralized Autonomous Organizations disclosing details of the digital object.

A Decentralized Autonomous Organization (DAO) is an F. E-Voting


organization that is run autonomously through a set of smart E-Voting is a problem with many difficulties. Many of
contracts. In contrast to traditional organizations or companies, the desired e-Voting properties have trade-offs. On one hand,
there is no central control or management. Instead, a DAO for example, privacy is a main requirement as votes should
is defined by a set of rules encoded in smart contracts that be anonymous to prevent coercion. On the other hand, e-
define how the DAO behaves and how it evolves. Typically, a voting should provide some sort of public verifiability, because
DAO has many investors that then decide by voting how the otherwise, the provider of the e-voting solution – or someone
funds of the DAO should be invested. As the goal of such an who managed to compromise it – might be able to change
organization is to be governed in a completely decentralized votes at will. In e-voting, many parties are involved and these
way and the investors generally don’t know or trust each other, parties typically do not trust each other. At the same time, e-
a permissionless blockchain is naturally a good fit for such a voting systems require public verifiability, and thus, many have
design: The system is required to store some state and multiple proposed to base e-voting systems on blockchain technology.
mutually distrusting and possibly unknown writers exist. Due to the requirements, it seems reasonable that blockchain
Decentralized autonomous organizations are, however, a technology can help to achieve some of the desired properties.
special case. For some applications a dedicated permissioned However, to the best of our knowledge, so far no solution has
blockchain may be useful for a single DAO. In most cases, been proposed that has been shown to be secure, verifiable,
however, DAOs do not require their own blockchain but are in- and private and there are still many open challenges.
stead better suited to be build on top of an existing blockchain Following our methodology – and depending on the trust
with an already existing currency (such as Ethereum [2]). model – one could use an always online trusted third party,
While a blockchain is suitable for this use case, such as is the case in today’s e-voting systems. However, it is
constructs can be dangerous, as history has shown (in the so- possible that the state is trusted for voter registration but not for
called “DAO Hack” [23]). If the code that governs such a DAO recording and tallying the votes of the election or referendum.
is not very carefully written, verified, and has mechanisms in In this case, we have an offline trusted third party, i.e. a public
permissioned blockchain may be a good fit. Such a system I. Trading and Fair Exchange Protocols
could be designed as a permissioned blockchain in which Fair multi-party exchange protocols have been extensively
political parties, NGOs or other partially trusted organizations studied in the literature. Due to the recent emergence of open
could take roles as validators. The security depends on the and decentralized blockchains (e.g. Bitcoin and Ethereum),
distribution of the validators, however, and one has to be however, the design of fair exchange protocols has recently
careful with assigning these roles. If, for example, a system experienced a renaissance. The exchange of digital goods is
assigns validator roles proportionally to the strengths of parties likely to be feasible without trusted dispute mediator [25],
in the last election, no additional properties in terms of trust while the exchange of physical goods still requires a trusted
is gained, if a single party has a majority. third party in case of disputes [26].
As fair exchange inherently assumes mutually mistrusting
G. Internet of Things parties that may even be anonymous, blockchain technology
Many have suggested possible use cases for blockchain immediately seems reasonable. In some cases, trading parties
technology in the Internet of Things (IoT) in combination may be able to use a trusted third party, but in others they may
with smart contracts with the aim to provide autonomous not. Following our methodology, a permissionless blockchain
systems that pay for resources that they consume and get paid is likely the best fit if only digital goods are exchanged.
for resources that they provide. As the system is inherently V. R ELATED W ORK
decentralized with entities that do not trust each other, using a
blockchain seems natural. However, as with supply chain man- Bitcoin [1], as the first open and decentralized blockchain,
agement (cf. Section IV-A) the interface between the physical initiated a large development in the area. Other permissionless
and the digital world poses a potential problem. If computers blockchains such as Zerocash [3] or Ethereum [2] build on
supply values that were read from sensors to the blockchain, the techniques used by Bitcoin and extend the possibilities
the blockchain does not guarantee the correctness of these through improved privacy or more expressive smart contracts.
values, i.e. if smart contracts behave according to values Other extensions such as hashed timelock contracts that are
supplied by sensors, the sensors – and whoever controls them – e.g. used in the lightning network [18] can be used to improve
necessarily need to be trusted, as demonstrated by the example the throughput of blockchains or to allow transfers of digital
in Figure 3 in Section IV-A. For many cases, if e.g. only assets between different blockchains.
automation is desired, a blockchain may not be necessary if a Through the emergence of Bitcoin, many companies now
trusted party can be used instead. In other cases, the specific develop their own permissioned blockchains (e.g. Corda [4],
trust assumption have to be studied and evaluated carefully to Hyperledger Fabric [11]) where the participants are limited
determine whether the use of a blockchain provides additional to a predefined set. Since the permissioned setting is simpler
value. than a permissionless setting, these permissioned blockchains
can use more efficient protocols for consensus that have been
known for decades such as PBFT [5].
H. Land Titles
Bonneau et al. systematize some blockchain properties
In particular in countries where corruption might dominate in [27] with a focus on cryptocurrencies and specifically
and the integrity of official documents could be questionable, Bitcoin. A good comparison of consensus algorithms for
the use of blockchain could potentially help to provide more use with permissioned and permissionless blockchains was
transparency through public verifiability. As such, several provided by Bano et al. [28] in 2017.
projects have started to secure land titles on a blockchain[24],
but to date it is unclear to what extent these projects will VI. C ONCLUSION
sustain a wider adoption. The idea is interesting, but similar The choice between a centralized database and a permis-
to supply chain management (cf. Section IV-A) and IoT (cf. sionless or permissioned blockchain is not trivial. While this
Section IV-G) the physical world needs to be connected to the question has been discussed before [29], to the best of our
digital, as the actual rights to a property eventually need to knowledge, we provide in this article the first structured
be enforced by some authority, i.e. there exists a party that methodology to decide which technological solution is the
is trusted for enforcement. This trusted party could simply most appropriate depending on which application scenario.
publish the register of land titles, which is in principle the Our methodology takes into account the required trust assump-
current practice today in most jurisdictions. However, a public tions, application requirements, involved parties and technical
ledger could ensure that an authority – that is not necessarily characteristics such as throughput and latency. We applied our
trusted for anything other than enforcement – could not methodology to three known application scenarios that have
change land ownership in an undetected manner. Additionally, seen wider interest to adopt blockchain technology and further
having land titles on a blockchain that also offers a method discussed other use cases. We conclude that depending on the
of payments would enable smart contracts to sell and buy application scenario, there are indeed valid use cases for each,
property. Overall, whether or not a blockchain can be useful permissionless and permissioned blockchains, and centralized
for a land registry depends strongly on the trust model and on databases that need to be determined carefully.
other capabilities that the blockchain instantiation offers.
R EFERENCES settlement. Washington, 2016. Board of Governors of the Federal
Reserve System. https://doi.org/10.17016/FEDS.2016.095.
[1] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2009. [15] SWIFT explores blockchain as part of its global payments
[2] Gavin Wood. Ethereum: A secure decentralised generalised transaction innovation initiative, 2017. https://www.swift.com/news-events/press-
ledger. Ethereum Project Yellow Paper, 151, 2014. releases/swift-explores-blockchain-as-part-of-its-global-payments-
[3] Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, innovation-initiative.
Ian Miers, Eran Tromer, and Madars Virza. Zerocash: Decentralized [16] Exploring the blockchain: cross-border settlement, 2016.
anonymous payments from bitcoin. In Security and Privacy (SP), 2014 https://vision.visaeurope.com/blogs/exploring-the-blockchain-cross-
IEEE Symposium on, pages 459–474. IEEE, 2014. border-settlement.
[4] Richard Gendal Brown, James Carlyle, Ian Grigg, and Mike Hearn.
[17] Ripple, 2017. https://ripple.com/.
Corda: An introduction. R3 CEV, August, 2016.
[18] Joseph Poon and Thaddeus Dryja. The bitcoin lightning network:
[5] Miguel Castro and Barbara Liskov. Practical byzantine fault tolerance.
Scalable off-chain instant payments, 2015.
In Proceedings of the Third Symposium on Operating Systems Design
[19] Wenting Li, Alessandro Sforzin, Sergey Fedorov, and Ghassan O.
and Implementation, OSDI ’99, pages 173–186, Berkeley, CA, USA,
Karame. Towards scalable and private industrial blockchains. In
1999. USENIX Association.
Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and
[6] Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis,
Contracts, BCC ’17, pages 9–14, New York, NY, USA, 2017. ACM.
Hubert Ritzdorf, and Srdjan Capkun. On the security and performance
of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC [20] Nick Szabo. Formalizing and securing relationships on public networks.
Conference on Computer and Communications Security, CCS ’16, pages First Monday, 2(9), 1997.
3–16, New York, NY, USA, 2016. ACM. [21] Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, and
[7] Skuchain, 2017. https://www.skuchain.com/. Srdjan Čapkun. TLS-N: Non-repudiation over TLS Enabling Ubiquitous
[8] Provenance, 2017. https://www.provenance.org/. Content Signing for Disintermediation. In NDSS, 2018.
[9] Robert Hackett. Walmart and ibm are partnering to put chinese pork [22] Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine
on a blockchain. Fortune, 2016. http://fortune.com/2016/10/19/walmart- Shi. Town crier: An authenticated data feed for smart contracts. In
ibm-blockchain-china-pork/. Proceedings of the 2016 aCM sIGSAC conference on computer and
[10] Everledger, 2017. https://www.everledger.io/. communications security, pages 270–282. ACM, 2016.
[11] Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Kon- [23] David Siegel. Understanding the dao attack. Web. http://www. coindesk.
stantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, com/understanding-dao-hack-journalists, 2016.
Gennady Laventman, Yacov Manevich, et al. Hyperledger fabric: [25] Wacław Banasik, Stefan Dziembowski, and Daniel Malinowski. Effi-
A distributed operating system for permissioned blockchains. arXiv cient zero-knowledge contingent payments in cryptocurrencies without
preprint arXiv:1801.10228, 2018. scripts. In European Symposium on Research in Computer Security,
[12] Mas working with industry to apply distributed ledger technology pages 261–280. Springer, 2016.
in securities settlement and cross border payments, 2017. http: [26] Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, and Arvind
//www.mas.gov.sg/News-and-Publications/Media-Releases/2017/MAS- Narayanan. Escrow protocols for cryptocurrencies: How to buy physical
working-with-industry-to-apply-Distributed-Ledger-Technology.aspx. goods using bitcoin. 2017.
[13] Carolyn A. Wilkins. Fintech and the financial ecosystem: Evolution [27] Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan,
or revolution?, 2016. http://www.bankofcanada.ca/wp-content/uploads/ Joshua A Kroll, and Edward W Felten. Sok: Research perspectives and
2016/06/remarks-170616.pdf. challenges for bitcoin and cryptocurrencies. In Security and Privacy
[14] David Mills, Kathy Wang, Brendan Malone, Anjana Ravi, Jeff Mar- (SP), 2015 IEEE Symposium on, pages 104–121. IEEE, 2015.
quardt, Clinton Chen, Anton Badev, Timothy Brezinski, Linda Fahy, [28] Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi,
Kimberley Liao, Vanessa Kargenian, Max Ellithorpe, Wendy Ng, and Patrick McCorry, Sarah Meiklejohn, and George Danezis. Sok: Con-
Maria Baird. Distributed ledger technology in payments, clearing, and sensus in the age of blockchains. arXiv preprint arXiv:1711.03936,
[24] Laura Shin. The first government to secure land titles on the bitcoin 2017.
blockchain expands project, 2017. https://www.forbes.com/sites/ [29] Gideon Greenspan. Avoiding the pointless blockchain project,
laurashin/2017/02/07/the-first-government-to-secure-land-titles-on-the- 2015. http://www.multichain.com/blog/2015/11/avoiding-pointless-
bitcoin-blockchain-expands-project/#22e2e6fa4dcd. blockchain-project/.

You might also like